What You’ll Learn Here.
Responsible AI Governance
Cybersecurity for AI Systems
Risk & Compliance Frameworks (NIST, ISO, AIDA)
Digital Ethics & Leadership
BLOGS
News & Articles
-
CISA adds four known exploited vulnerabilities to its catalog
CISA has added four new vulnerabilities to its Catalog of Known Exploited Vulnerabilities (KEV), based on evidence of active exploitation. These types of vulnerabilities are…
-
CISA adds two known exploited vulnerabilities to its catalog
CISA has added two new vulnerabilities to its Catalog of Known Exploited Vulnerabilities (KEV), based on evidence of active exploitation. CVE-2009-0238 Microsoft Office Remote Code…
-
Multiple vulnerabilities in Mozilla products could allow arbitrary code execution
MS-ISAC NOTICE NUMBER:2026-032ISSUE DATE(S):04/07/2026PREVIEW:Several vulnerabilities have been discovered in Mozilla products, the most serious of which could allow the execution of arbitrary code. Mozilla Firefox…
-
Iranian-Affiliated Cyber Actors Exploit Programmable Logic Controllers Across US Critical Infrastructure
Advisory at a Glance Title Iranian-Affiliated Cyber Actors Exploit Programmable Logic Controllers Across US Critical Infrastructure Original Publication April 7, 2026 Executive Summary Iran-affiliated advanced…













